Which of the following should NOT be a part of an organization's policy regarding email attachments?
a. It was an expected attachment.
b. It came from a known source, and the source is confirmed.
c. It appears to be a legitimate business document.
d. None of the above
Answer D. These are all acceptable criteria for an email policy.
Computer Science & Information Technology
You might also like to view...
Prior to becoming a qualified digital forensic investigator, a person must prove their ability as a computer scientist
a. True b. False
Computer Science & Information Technology
Discovering a user's password by observing the keys he or she presses is called which of the following?
a. Password hashing b. Password crunching c. Piggybacking d. Shoulder surfing
Computer Science & Information Technology